The study proposes a new self-autonomous system for intelligent transport systems based on the efficient hybrid validation fault-tolerant scheme of a symbol blockchain based on the remote method invocation (RMI) mechanism, as shown in
Figure 1. In the proposed work, there are two main self-autonomous agents: the client RMI and the system RMI agent. The RMI client agent controls the application objects and methods on the local drone machine while processing the workflow application locally, adhering to a set of stringent requirements. The system is designed using remote method invocation (RMI), where functions are declared on the client side and executed on the server side to minimize the burden on the local drone device. The client RMI has two parts: (a) The drone is installed with workflow applications for package delivery. All tasks in the workflow application are interdependent. Initially, all the parents will be executed, and their predecessors will run the applications. For example, the package delivery workflow applications have several tasks: registration account, login, package information, location tracing, short path finding, trip progress, data saving, and others, all of which are executed on different computing nodes, as shown in
Figure 1b at the client RMI. The RMI system is another agent that controls server execution, application security, and processing costs of the applications, as shown in
Figure 1b. The client RMI offloads the data of all tasks to the system RMI. Different states manage the tasks in the system. The system utilizes serverless functions from various cloud providers, including Amazon, Azure, and Google, as well as their respective functions. To validate the integrity of function and task data, the study devises a symbol blockchain scheme that incorporates hybrid validation (e.g., data-hashing validation among nodes and function authenticity checks before being added to the system services pool for further usage). To adopt uncertainty in resource allocation and workflow execution, the study devises the self-autonomous blockchain-enabled cost-efficient system (SBECES) algorithm framework, which comprises various schemes. The four key schemes are the deep Q-learning network (DQN), state management, hybrid validation, fault-tolerant, and adaptive allocation scheduler policy, which control the entire system during workflow execution.
3.1. Drone Edge Cloud Scenario System Model
We present the system model of the scenario, which is a blockchain-enabled self-autonomous intelligent transport system (BESITS), designed to coordinate drone-based workflow tasks across local (drone), edge, and cloud computing layers using socket programming as the backbone for communication and blockchain as the trust anchor, as shown in
Figure 2.
In this system, autonomous drones operate as local nodes, equipped with embedded sensors, GPS modules, obstacle detection systems, and onboard computation units. These drones are assigned tasks such as package deliveries, traffic surveillance, and emergency response. Each drone operates independently, making real-time decisions based on sensor inputs, yet it collaborates within a networked infrastructure through socket-based communication. For example, one drone might detect congestion on a route and relay that information via socket communication to a neighboring drone and the edge node, prompting rerouting. These drones, acting as intelligent transport agents, continuously monitor their environment, collect data such as their own geolocation, environmental conditions, or task status, and send this data to a nearby edge node using TCP or UDP sockets. UDP sockets are primarily used for lightweight telemetry transmission, such as location and battery updates. In contrast, TCP sockets ensure the reliable delivery of critical messages such as task commands or AI inferences.
Once the data reaches the edge layer, which includes geographically distributed edge cloud servers, it undergoes real-time analysis, decision-making, and storage. These edge nodes serve as intermediate computational entities that reduce latency and offload the cloud. Here, lightweight AI models are applied for tasks such as route prediction, swarm coordination, or object recognition from drone feeds. Additionally, each edge server operates a lightweight blockchain node, such as a Hyperledger Fabric or Quorum instance, which maintains a local copy of the distributed ledger. The blockchain network stores hashes of drone actions such as pick-up/drop tasks, timestamped logs, and task authentication. These entries ensure immutability and verifiability, forming a tamper-proof audit trail that government bodies or auditing systems can verify when needed. Blockchain smart contracts are deployed at the edge to automatically validate incoming drone requests, check permission tokens, and approve or reject the continuation of tasks. For instance, if a drone intends to enter a geo-fenced area, it must first request access from the smart contract deployed on the edge blockchain. If the policy allows the operation (e.g., based on time, weather, or priority of delivery), the drone receives a digitally signed confirmation and proceeds. This integration ensures decentralized trust and accountability without relying on a single point of control. In the cloud layer, the full system-level orchestration takes place. The cloud servers are responsible for collecting and analyzing historical data from all edge nodes. They host centralized blockchain nodes that synchronize with the edge ledgers, train deep learning models using aggregated drone telemetry, and provide predictive analytics such as traffic forecasting, fault detection, and environmental modeling. For example, by combining video feeds and location data from hundreds of drones over time, the cloud AI engine can train a model to detect patterns of congestion or identify accident-prone zones. These insights are then shared with the edge servers or directly transmitted back to drones as updated behavioral models. Socket-based persistent connections are maintained between edge and cloud layers to allow seamless data streaming, control instructions, and blockchain synchronization. Security is a major concern in such decentralized systems, and blockchain addresses these challenges effectively. All drone identities are registered on the blockchain network with unique cryptographic credentials. This allows mutual authentication when a drone connects to an edge server. Moreover, the use of smart contracts ensures that only authorized drones perform sensitive operations such as entering restricted airspace or handling emergency supplies. Since all events are recorded immutably on the distributed ledger, the system maintains complete transparency, which is critical in public transportation and logistics environments. In case of operational disputes or failures, system stakeholders can verify each action through the blockchain’s traceable records. The diagram presented in
Figure 2 visually illustrates this architecture. It shows drones operating at the local level, sending data via socket connections to edge cloud servers, where preliminary processing and blockchain validation occur. The edge layer interacts with a centralized cloud platform through further socket-based channels. The figure emphasizes the role of blockchain at the edge and cloud tiers, reinforcing trust and integrity across the workflow. It also shows drone-to-drone and drone-to-vehicle interactions occurring in real time, coordinated by the edge cloud networks. This visual representation provides readers with a comprehensive understanding of the data flow, communication architecture, and system distribution in the BESITS framework. Consider an emergency response scenario in Karachi Smart City, where a road accident has occurred and emergency supplies need to be dispatched urgently. A drone, stationed nearby, receives a broadcast from the central transport AI system. It initiates a socket connection to the edge server, sharing its current location, battery level, and readiness status. The edge server validates the drone’s credentials using blockchain, assigns the pickup location, and activates the task via a smart contract. The drone flies autonomously, avoiding obstacles and adjusting for weather changes using its onboard intelligence. It continuously streams its progress to the edge server, which logs events to the blockchain. If the edge server detects interference or unpredictable behavior, it issues a real-time override, guiding the drone to the closest safe path. All communication, decisions, and operational metadata are stored immutably, ensuring accountability and post-operation analysis. Once the task is completed, the cloud server updates the drone’s profile with performance metrics and retrains its AI module if necessary.
In another instance, drones are deployed for traffic surveillance across a dense urban corridor. They fly in formation and relay real-time traffic footage and congestion levels to edge servers. The edge applies deep reinforcement learning to detect irregularities or hazards and, if necessary, invokes blockchain-based workflows to trigger alert messages or coordinate rerouting efforts with smart traffic lights. Meanwhile, the cloud continuously refines global AI models to optimize fleet distribution and anticipatory rerouting based on historical trends.
This seamless interplay among autonomy, distributed intelligence, and trust demonstrates the efficacy of the BESITS framework. The use of socket programming enables real-time, bidirectional communication across nodes, while blockchain ensures that every decision is secure, verifiable, and tamper-resistant. This approach ensures resilience against cyberattacks, enhances transparency, and supports rapid decision-making in time-critical environments. It is highly scalable, suitable for multi-drone operations, and compatible with future extensions involving digital twins, AIoT, and smart grid integrations.
3.2. Problem Formulation
This study presents the drone workflow applications using a directed acyclic graph, i.e.,
, where
V represents the variable showing workflow tasks, and
E denotes the communication of tasks via edges, as shown in
Table 1. The
G application has an
N task number. Where the
task is an entry task, the
task is an exit task. Each task
has a deadline of
and data
during execution in the system. The study considered the
numbers of computing nodes and the {
numbers of blocks for the mining process across all tasks. Each computing node,
, is associated with a specific network block. The study considered package delivery drones, e.g.,
, exploiting application
G to achieve the business goal of transferring packages from one location to another. The drone contains a set of values such as location
, speed
.
The assignment of tasks is determined in Equation (
1), where each task is assigned to one function in the specific computing node. There are two execution processes in the study, such as execution time on the function and security and privacy validation of tasks during processing of the blockchain mechanism. The study determines the execution time of tasks in the following.
The execution time and cost depend on the completion of tasks and usage memory of the function, as illustrated in Equation (
2). Initially, the study divides the workflow application deadlines in the following way.
These Equations (
4)–(
6) make sure that all tasks are executed within their deadlines.
The blockchain hashing and validation are determined based on Equation (
7).
The validation of communication data in the decentralized function are determined based on the blockchain hashing method, where the current and previous functions must be matched during data processing, as illustrated in Equation (
8).
The objective function of the study is to minimize the processing cost of all workflow applications, as determined in Equation (
11).
This study models drone workflow applications using a directed acyclic graph (DAG)
, where
V denotes the set of workflow tasks, and
E defines the communication edges between them, as specified in
Table 1. The DAG-based application contains
N tasks, with
representing the entry task and
the final exit task. Each task
is characterized by a deadline
and associated execution data
. The execution environment consists of a set of computing nodes
and blockchain blocks
used for data validation and security. Each computing node
may be linked to a blockchain block
, forming a decentralized processing and validation infrastructure. Drones executing the workflow are modeled with mobility parameters such as location
and speed
. Task assignment is determined by Equation (
1), where a binary variable
indicates whether a specific task
is assigned to node
j. The system accounts for both functional execution and blockchain-based security validation during task execution. The total execution time of task
on node
j is quantified in Equation (
2), which calculates time as a function of data size, memory usage
, computational capacity
, and the overhead from blockchain validation
. To manage deadline constraints across all tasks, the workflow’s overall deadline is proportionally divided using a ratio metric defined in Equation (
3). This ratio is then applied to adjust the execution time (Equation (
4)), edge delay (Equation (
5)), and finally to update the remaining task deadlines based on precedence constraints, as formulated in Equation (
6). This ensures all tasks are scheduled within their respective deadlines. Blockchain validation costs, including hashing and consensus verification, are calculated in Equation (
7), which models the cost as a function of data size and edge communication latency normalized by the block bandwidth
. The validation of communication data integrity across blockchain blocks is defined in Equation (
8), where hash values of successive tasks must match to preserve tamper-proof execution history. The cryptographic operation used is SHA-256 and its hashing cost are captured in Equation (
9), showing the dependence on data size and memory capacity. The overall system objective is to minimize the processing cost
X across all workflow applications by summing the execution times
for each application
G, as outlined in Equation (
11), subject to the constraint that each task’s execution must complete within its assigned deadline. This optimization strategy guides task scheduling under decentralized, secure, and resource-constrained edge–cloud environments for drone-based intelligent transport systems.
In the proposed SBECES framework, the total processing cost is composed of three primary components: execution cost, communication cost, and security cost, each representing a distinct resource consumption factor in the drone-based workflow system. Execution cost refers to the computational resources consumed during the processing of drone workflow tasks. This includes the CPU/GPU cycles used by onboard processing units, edge servers, or cloud nodes to execute AI-based control algorithms, path planning, video analysis, and decision-making logic. It is quantified based on the execution time multiplied by the computational resource pricing (e.g., per-second or per-instruction cycle). Communication cost represents the data transmission overhead among drones, edge, and cloud nodes. It includes bandwidth usage, transmission energy, and network latency penalties. The cost is influenced by factors such as data packet size, frequency of updates, and network congestion, and is computed based on the data volume transmitted and the network rate. Security cost refers to the overhead introduced by blockchain operations, including data hashing, encryption, consensus verification, and smart contract execution. These operations incur additional computation and communication delays, which are quantified as latency and energy overhead in the security model. Together, these three costs define the system’s operational efficiency.
To complement the proposed system architecture, we now provide a detailed network and communication model tailored to the nature of wireless mobile communication scenarios involving extensive real-time data collection and exchange among drones, edge, and cloud nodes. Given that self-autonomous intelligent transport applications operate in highly dynamic environments, the underlying communication infrastructure must support real-time, secure, and scalable data transfer. The proposed SBECES (self-autonomous blockchain-enabled cost-efficient system) framework is modeled using a heterogeneous, multi-tiered wireless communication network comprising local (drone), edge (fog), and cloud (centralized) components. Each drone operates as a mobile device which is connected to the edge cloud network with the stable format of communication channels. To mathematically describe communication behavior, we adopt Shannon’s capacity model to define the achievable data rate
between a drone
d and its associated edge node
e as:
where
denotes the available bandwidth, and SNR is the signal-to-noise ratio, which dynamically varies based on distance, interference, and drone mobility. The network topology follows a client–server remote method invocation (RMI) model, where drones act as remote clients invoking workflow execution methods on edge/cloud servers. Edge nodes serve as intermediate decision and caching layers, running containerized microservices to evaluate incoming data, perform Q-learning-based policy selection, and validate data authenticity using the symbol-type blockchain-based hash validation and fault-tolerant (HVFT) mechanism. These blockchain operations are treated as lightweight background processes and are integrated into the network model as additional latency
, computed during consensus and block propagation phases. Between the edge and cloud layers, high-speed fiber or mmWave backhaul communication is assumed, with average round-trip latency
constrained to under 50 ms to maintain quality of service (QoS) during dynamic workflow scheduling. The deep reinforcement learning (DRL)-enabled adaptive scheduler monitors network congestion and available processing bandwidth at the edge in real-time and dynamically adjusts task offloading and data routing strategies. This enables the SBECES framework to maintain QoS guarantees across multiple key performance indicators such as task completion deadlines, communication reliability, and transmission energy costs. The SBECES framework’s network model accounts for realistic communication conditions inherent to mobile self-autonomous systems. It integrates wireless communication constraints, edge–cloud latency, data validation using blockchain, and DRL-based scheduling to ensure efficient and secure transport workflows. This comprehensive approach enables a scalable and fault-tolerant networked architecture suitable for drone-based intelligent transportation applications in real-world smart city environments.